Highlights
- Pro
Stars
UNIX-like reverse engineering framework and command-line toolset
A repository for learning various heap exploitation techniques.
A command line tool that recreates the famous data decryption effect seen in the 1992 movie Sneakers.
Course materials for Modern Binary Exploitation by RPISEC
A low-power E-Paper weather display powered by an ESP32 microcontroller. Utilizes the OpenWeatherMap API.
A tool to dump the login password from the current linux user
Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.
Connect like there is no firewall. Securely.
Wiki-like CTF write-ups repository, maintained by the community. 2016
A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.
Demos of various injection techniques found in malware
This is an implementation of a native-code Meterpreter, designed for portability, embeddability, and low resource utilization.
Some pwn challenges selected for training and education.
Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC
The source code of the Zeus Evolution botnet that used TOR.